For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law...
Read moreActions to Take to Defeat Initial Access Brokers
November 18 2023Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
Read moreHands Off the Security Budget! Find Efficiencies to Reduce Risk
November 17 2023Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.
Read moreDetection & Response That Scales: A 4-Pronged Approach
November 17 2023Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.
Read moreOrganizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.
Read moreDangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass
November 17 2023There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.
Read more‘CacheWarp’ AMD VM Bug Opens the Door to Privilege Escalation
November 17 2023Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.
Read moreVehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.
Read moreUnpatched Critical Vulnerabilities Open AI Models to Takeover
November 17 2023The security holes can allow server takeover, information theft, model poisoning, and more.
Read more
Recent Comments